
HIPAA Basics V: Comprehensive Guide to HIPAA Breach Rule for Covered Entities
No one believes a breach will happen to them - until it's too late. Know when and how to respond, according to the HIPAA Breach Notification Rule.
HIPAA Basics IV: The Evolution of Healthcare Data Protection
Securing digital health information in today's world requires significant technical expertise. The aim of the HIPAA Security Rule is to maintain the “CIA” of HIPAA data: confidentiality, integrity, and availability while keeping hackers at bay.
HIPAA Basics III: Understanding Penetration Testing and Vulnerability Assessments
Just as medical professionals rely on different types of scans to diagnose various conditions in the human body, a HIPAA host will also utilize specialized scans to identify possible abnormalities and weaknesses in your system.
HIPAA Basics II: Building a Robust Cybersecurity Culture for Healthcare Data Protection
HIPAA compliance is not optional when it comes to hosting private medical files. It is a requirement that can result in a fine and other penalties if violated, even accidentally. Many hosts claim to offer HIPAA compliant hosting, but in fact, may be missing certain features that could result in a breach of data security and/or a violation of HIPAA compliance.